Sciweavers

799 search results - page 148 / 160
» Network anomaly detection based on TCM-KNN algorithm
Sort
View
CCR
2002
112views more  CCR 2002»
13 years 7 months ago
New directions in traffic measurement and accounting
Accurate network traffic measurement is required for accounting, bandwidth provisioning and detecting DoS attacks. These applications see the traffic as a collection of flows they...
Cristian Estan, George Varghese
TWC
2010
13 years 2 months ago
Mitigating selective forwarding attacks with a channel-aware approach in WMNs
In this paper, we consider a special case of denial of service (DoS) attack in wireless mesh networks (WMNs) known as selective forwarding attack (a.k.a gray hole attacks). With su...
Devu Manikantan Shila, Yu Cheng, Tricha Anjali
RAID
2001
Springer
14 years 4 days ago
Probabilistic Alert Correlation
With the growing deployment of host and network intrusion detection systems, managing reports from these systems becomes critically important. We present a probabilistic approach t...
Alfonso Valdes, Keith Skinner
CIC
2003
150views Communications» more  CIC 2003»
13 years 9 months ago
Performance Modeling of a Cluster of Workstations
Using off-the-shelf commodity workstations to build a cluster for parallel computing has become a common practice. In studying or designing a cluster of workstations one should ha...
Ahmed M. Mohamed, Lester Lipsky, Reda A. Ammar
JNSM
2008
93views more  JNSM 2008»
13 years 7 months ago
Optimal IDS Sensor Placement and Alert Prioritization Using Attack Graphs
We optimally place intrusion detection system (IDS) sensors and prioritize IDS alerts using attack graph analysis. We begin by predicting all possible ways of penetrating a networ...
Steven Noel, Sushil Jajodia